-
Neural Pose Representation Learning for Generating and Transferring Non-Rigid Object Poses
Authors:
Seungwoo Yoo,
Juil Koo,
Kyeongmin Yeo,
Minhyuk Sung
Abstract:
We propose a novel method for learning representations of poses for 3D deformable objects, which specializes in 1) disentangling pose information from the object's identity, 2) facilitating the learning of pose variations, and 3) transferring pose information to other object identities. Based on these properties, our method enables the generation of 3D deformable objects with diversity in both ide…
▽ More
We propose a novel method for learning representations of poses for 3D deformable objects, which specializes in 1) disentangling pose information from the object's identity, 2) facilitating the learning of pose variations, and 3) transferring pose information to other object identities. Based on these properties, our method enables the generation of 3D deformable objects with diversity in both identities and poses, using variations of a single object. It does not require explicit shape parameterization such as skeletons or joints, point-level or shape-level correspondence supervision, or variations of the target object for pose transfer. To achieve pose disentanglement, compactness for generative models, and transferability, we first design the pose extractor to represent the pose as a keypoint-based hybrid representation and the pose applier to learn an implicit deformation field. To better distill pose information from the object's geometry, we propose the implicit pose applier to output an intrinsic mesh property, the face Jacobian. Once the extracted pose information is transferred to the target object, the pose applier is fine-tuned in a self-supervised manner to better describe the target object's shapes with pose variations. The extracted poses are also used to train a cascaded diffusion model to enable the generation of novel poses. Our experiments with the DeformThings4D and Human datasets demonstrate state-of-the-art performance in pose transfer and the ability to generate diverse deformed shapes with various objects and poses.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
The variation in the response of solar full-disc magnetographs
Authors:
K. L. Yeo,
S. K. Solanki,
N. A. Krivova
Abstract:
We compared magnetograms from the KPVT/SPM, SoHO/MDI, SOLIS/VSM, and SDO/HMI with the aim of probing the effect on measured solar magnetism of the variation in instrument response with time, magnetogram signal level, and position on the solar disc. Taking near-simultaneous observations from the various instruments, we examined the surface coverage by magnetic activity and the effect of cross-calib…
▽ More
We compared magnetograms from the KPVT/SPM, SoHO/MDI, SOLIS/VSM, and SDO/HMI with the aim of probing the effect on measured solar magnetism of the variation in instrument response with time, magnetogram signal level, and position on the solar disc. Taking near-simultaneous observations from the various instruments, we examined the surface coverage by magnetic activity and the effect of cross-calibrating the various instruments under different assumptions. By comparing the surface coverage by magnetic activity in the observations from the various instruments, we traced the effect of the time variation in instrument response on the longitudinal magnetogram signal and disc-integrated unsigned magnetic flux. This yielded evidence of acute changes in the response of MDI and VSM with certain events such as the SoHO vacation in 1998 and the upgrade of the VSM CCD camera in 2009. Excluding these changes, the effect of instrument instability on the magnetogram signal and disc-integrated magnetic flux appears to be rather benign, with an associated uncertainty of less than 2%. We determined the magnetogram signal ratio between each instrument pairing as a function of magnetogram signal level and distance from disc centre and with it cross-calibrated the various instruments. We compared the result with that from repeating the cross-calibration with the overall magnetogram signal ratio. This allowed us to estimate the uncertainty in the magnetogram signal associated with the variation in instrument response with magnetogram signal level and distance from disc centre to be about 8% to 14%. The corresponding uncertainty in the disc-integrated magnetic flux is about 7% to 23 %. The results here will be useful to the interpretation of SPM, MDI, VSM, and HMI magnetograms. As examples, we applied our findings to selected results from earlier studies based on such data.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
General Item Representation Learning for Cold-start Content Recommendations
Authors:
Jooeun Kim,
**ri Kim,
Kwangeun Yeo,
Eungi Kim,
Kyoung-Woon On,
Jonghwan Mun,
Joonseok Lee
Abstract:
Cold-start item recommendation is a long-standing challenge in recommendation systems. A common remedy is to use a content-based approach, but rich information from raw contents in various forms has not been fully utilized. In this paper, we propose a domain/data-agnostic item representation learning framework for cold-start recommendations, naturally equipped with multimodal alignment among vario…
▽ More
Cold-start item recommendation is a long-standing challenge in recommendation systems. A common remedy is to use a content-based approach, but rich information from raw contents in various forms has not been fully utilized. In this paper, we propose a domain/data-agnostic item representation learning framework for cold-start recommendations, naturally equipped with multimodal alignment among various features by adopting a Transformer-based architecture. Our proposed model is end-to-end trainable completely free from classification labels, not just costly to collect but suboptimal for recommendation-purpose representation learning. From extensive experiments on real-world movie and news recommendation benchmarks, we verify that our approach better preserves fine-grained user taste than state-of-the-art baselines, universally applicable to multiple domains at large scale.
△ Less
Submitted 21 April, 2024;
originally announced April 2024.
-
SyncTweedies: A General Generative Framework Based on Synchronized Diffusions
Authors:
Jaihoon Kim,
Juil Koo,
Kyeongmin Yeo,
Minhyuk Sung
Abstract:
We introduce a general framework for generating diverse visual content, including ambiguous images, panorama images, mesh textures, and Gaussian splat textures, by synchronizing multiple diffusion processes. We present exhaustive investigation into all possible scenarios for synchronizing multiple diffusion processes through a canonical space and analyze their characteristics across applications.…
▽ More
We introduce a general framework for generating diverse visual content, including ambiguous images, panorama images, mesh textures, and Gaussian splat textures, by synchronizing multiple diffusion processes. We present exhaustive investigation into all possible scenarios for synchronizing multiple diffusion processes through a canonical space and analyze their characteristics across applications. In doing so, we reveal a previously unexplored case: averaging the outputs of Tweedie's formula while conducting denoising in multiple instance spaces. This case also provides the best quality with the widest applicability to downstream tasks. We name this case SyncTweedies. In our experiments generating visual content aforementioned, we demonstrate the superior quality of generation by SyncTweedies compared to other synchronization methods, optimization-based and iterative-update-based methods.
△ Less
Submitted 20 June, 2024; v1 submitted 21 March, 2024;
originally announced March 2024.
-
Deep Learning-based Kinetic Analysis in Paper-based Analytical Cartridges Integrated with Field-effect Transistors
Authors:
Hyun-June Jang,
Hyou-Arm Joung,
Artem Goncharov,
Anastasia Gant Kanegusuku,
Clarence W. Chan,
Kiang-Teck Jerry Yeo,
Wen Zhuang,
Aydogan Ozcan,
Junhong Chen
Abstract:
This study explores the fusion of a field-effect transistor (FET), a paper-based analytical cartridge, and the computational power of deep learning (DL) for quantitative biosensing via kinetic analyses. The FET sensors address the low sensitivity challenge observed in paper analytical devices, enabling electrical measurements with kinetic data. The paper-based cartridge eliminates the need for sur…
▽ More
This study explores the fusion of a field-effect transistor (FET), a paper-based analytical cartridge, and the computational power of deep learning (DL) for quantitative biosensing via kinetic analyses. The FET sensors address the low sensitivity challenge observed in paper analytical devices, enabling electrical measurements with kinetic data. The paper-based cartridge eliminates the need for surface chemistry required in FET sensors, ensuring economical operation (cost < $0.15/test). The DL analysis mitigates chronic challenges of FET biosensors such as sample matrix interference, by leveraging kinetic data from target-specific bioreactions. In our proof-of-concept demonstration, our DL-based analyses showcased a coefficient of variation of < 6.46% and a decent concentration measurement correlation with an r2 value of > 0.976 for cholesterol testing when blindly compared to results obtained from a CLIA-certified clinical laboratory. These integrated technologies can create a new generation of FET-based biosensors, potentially transforming point-of-care diagnostics and at-home testing through enhanced accessibility, ease-of-use, and accuracy.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
Optimal Sensor Allocation with Multiple Linear Dispersion Processes
Authors:
Xinchao Liu,
Dzung Phan,
Youngdeok Hwang,
Levente Klein,
Xiao Liu,
Kyongmin Yeo
Abstract:
This paper considers the optimal sensor allocation for estimating the emission rates of multiple sources in a two-dimensional spatial domain. Locations of potential emission sources are known (e.g., factory stacks), and the number of sources is much greater than the number of sensors that can be deployed, giving rise to the optimal sensor allocation problem. In particular, we consider linear dispe…
▽ More
This paper considers the optimal sensor allocation for estimating the emission rates of multiple sources in a two-dimensional spatial domain. Locations of potential emission sources are known (e.g., factory stacks), and the number of sources is much greater than the number of sensors that can be deployed, giving rise to the optimal sensor allocation problem. In particular, we consider linear dispersion forward models, and the optimal sensor allocation is formulated as a bilevel optimization problem. The outer problem determines the optimal sensor locations by minimizing the overall Mean Squared Error of the estimated emission rates over various wind conditions, while the inner problem solves an inverse problem that estimates the emission rates. Two algorithms, including the repeated Sample Average Approximation and the Stochastic Gradient Descent based bilevel approximation, are investigated in solving the sensor allocation problem. Convergence analysis is performed to obtain the performance guarantee, and numerical examples are presented to illustrate the proposed approach.
△ Less
Submitted 18 January, 2024;
originally announced January 2024.
-
A 3D super-resolution of wind fields via physics-informed pixel-wise self-attention generative adversarial network
Authors:
Takuya Kurihana,
Kyongmin Yeo,
Daniela Szwarcman,
Bruce Elmegreen,
Karthik Mukkavilli,
Johannes Schmude,
Levente Klein
Abstract:
To mitigate global warming, greenhouse gas sources need to be resolved at a high spatial resolution and monitored in time to ensure the reduction and ultimately elimination of the pollution source. However, the complexity of computation in resolving high-resolution wind fields left the simulations impractical to test different time lengths and model configurations. This study presents a preliminar…
▽ More
To mitigate global warming, greenhouse gas sources need to be resolved at a high spatial resolution and monitored in time to ensure the reduction and ultimately elimination of the pollution source. However, the complexity of computation in resolving high-resolution wind fields left the simulations impractical to test different time lengths and model configurations. This study presents a preliminary development of a physics-informed super-resolution (SR) generative adversarial network (GAN) that super-resolves the three-dimensional (3D) low-resolution wind fields by upscaling x9 times. We develop a pixel-wise self-attention (PWA) module that learns 3D weather dynamics via a self-attention computation followed by a 2D convolution. We also employ a loss term that regularizes the self-attention map during pretraining, capturing the vertical convection process from input wind data. The new PWA SR-GAN shows the high-fidelity super-resolved 3D wind data, learns a wind structure at the high-frequency domain, and reduces the computational cost of a high-resolution wind simulation by x89.7 times.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
A Supervised Contrastive Learning Pretrain-Finetune Approach for Time Series
Authors:
Trang H. Tran,
Lam M. Nguyen,
Kyongmin Yeo,
Nam Nguyen,
Roman Vaculin
Abstract:
Foundation models have recently gained attention within the field of machine learning thanks to its efficiency in broad data processing. While researchers had attempted to extend this success to time series models, the main challenge is effectively extracting representations and transferring knowledge from pretraining datasets to the target finetuning dataset. To tackle this issue, we introduce a…
▽ More
Foundation models have recently gained attention within the field of machine learning thanks to its efficiency in broad data processing. While researchers had attempted to extend this success to time series models, the main challenge is effectively extracting representations and transferring knowledge from pretraining datasets to the target finetuning dataset. To tackle this issue, we introduce a novel pretraining procedure that leverages supervised contrastive learning to distinguish features within each pretraining dataset. This pretraining phase enables a probabilistic similarity metric, which assesses the likelihood of a univariate sample being closely related to one of the pretraining datasets. Subsequently, using this similarity metric as a guide, we propose a fine-tuning procedure designed to enhance the accurate prediction of the target data by aligning it more closely with the learned dynamics of the pretraining datasets. Our experiments have shown promising results which demonstrate the efficacy of our approach.
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
Reconstruction of total solar irradiance variability as simultaneously apparent from Solar Orbiter and Solar Dynamics Observatory
Authors:
K. L. Yeo,
N. A. Krivova,
S. K. Solanki,
J. Hirzberger,
D. Orozco Suárez,
K. Albert,
N. Albelo Jorge,
T. Appourchaux,
A. Alvarez-Herrero,
J. Blanco Rodríguez,
A. Gandorfer,
P. Gutierrez-Marques,
F. Kahil,
M. Kolleck,
J. C. del Toro Iniesta,
R. Volkmer,
J. Woch,
B. Fiethe,
I. Pérez-Grande,
E. Sanchis Kilders,
M. Balaguer Jiménez,
L. R. Bellot Rubio,
D. Calchetti,
M. Carmona,
A. Feller
, et al. (20 additional authors not shown)
Abstract:
Solar irradiance variability has been monitored almost exclusively from the Earth's perspective. {We present a method to combine the unprecedented observations of the photospheric magnetic field and continuum intensity from outside the Sun-Earth line, which is being recorded by the Polarimetric and Helioseismic Imager on board the Solar Orbiter mission (SO/PHI), with solar observations recorded fr…
▽ More
Solar irradiance variability has been monitored almost exclusively from the Earth's perspective. {We present a method to combine the unprecedented observations of the photospheric magnetic field and continuum intensity from outside the Sun-Earth line, which is being recorded by the Polarimetric and Helioseismic Imager on board the Solar Orbiter mission (SO/PHI), with solar observations recorded from the Earth's perspective to examine the solar irradiance variability from both perspectives simultaneously.} Taking SO/PHI magnetograms and continuum intensity images from the cruise phase of the Solar Orbiter mission and concurrent observations from the Helioseismic and Magnetic Imager onboard the Solar Dynamics Observatory (SDO/HMI) as input into the SATIRE-S model, we successfully reconstructed the total solar irradiance variability as apparent from both perspectives. In later stages of the SO mission, the orbital plane will tilt in such a way as to bring the spacecraft away from the ecliptic to heliographic latitudes of up to $33^{\circ}$. The current study sets the template for the reconstruction of solar irradiance variability as seen from outside the ecliptic from data that SO/PHI is expected to collect from such positions. {Such a reconstruction will be beneficial to factoring inclination into how the brightness variations of the Sun compare to those of other cool stars, whose rotation axes are randomly inclined.
△ Less
Submitted 28 September, 2023;
originally announced September 2023.
-
Transferability of Representations Learned using Supervised Contrastive Learning Trained on a Multi-Domain Dataset
Authors:
Alvin De Jun Tan,
Clement Tan,
Chai Kiat Yeo
Abstract:
Contrastive learning has shown to learn better quality representations than models trained using cross-entropy loss. They also transfer better to downstream datasets from different domains. However, little work has been done to explore the transferability of representations learned using contrastive learning when trained on a multi-domain dataset. In this paper, a study has been conducted using th…
▽ More
Contrastive learning has shown to learn better quality representations than models trained using cross-entropy loss. They also transfer better to downstream datasets from different domains. However, little work has been done to explore the transferability of representations learned using contrastive learning when trained on a multi-domain dataset. In this paper, a study has been conducted using the Supervised Contrastive Learning framework to learn representations from the multi-domain DomainNet dataset and then evaluate the transferability of the representations learned on other downstream datasets. The fixed feature linear evaluation protocol will be used to evaluate the transferability on 7 downstream datasets that were chosen across different domains. The results obtained are compared to a baseline model that was trained using the widely used cross-entropy loss. Empirical results from the experiments showed that on average, the Supervised Contrastive Learning model performed 6.05% better than the baseline model on the 7 downstream datasets. The findings suggest that Supervised Contrastive Learning models can potentially learn more robust representations that transfer better across domains than cross-entropy models when trained on a multi-domain dataset.
△ Less
Submitted 27 September, 2023;
originally announced September 2023.
-
DeformToon3D: Deformable 3D Toonification from Neural Radiance Fields
Authors:
Junzhe Zhang,
Yushi Lan,
Shuai Yang,
Fangzhou Hong,
Quan Wang,
Chai Kiat Yeo,
Ziwei Liu,
Chen Change Loy
Abstract:
In this paper, we address the challenging problem of 3D toonification, which involves transferring the style of an artistic domain onto a target 3D face with stylized geometry and texture. Although fine-tuning a pre-trained 3D GAN on the artistic domain can produce reasonable performance, this strategy has limitations in the 3D domain. In particular, fine-tuning can deteriorate the original GAN la…
▽ More
In this paper, we address the challenging problem of 3D toonification, which involves transferring the style of an artistic domain onto a target 3D face with stylized geometry and texture. Although fine-tuning a pre-trained 3D GAN on the artistic domain can produce reasonable performance, this strategy has limitations in the 3D domain. In particular, fine-tuning can deteriorate the original GAN latent space, which affects subsequent semantic editing, and requires independent optimization and storage for each new style, limiting flexibility and efficient deployment. To overcome these challenges, we propose DeformToon3D, an effective toonification framework tailored for hierarchical 3D GAN. Our approach decomposes 3D toonification into subproblems of geometry and texture stylization to better preserve the original latent space. Specifically, we devise a novel StyleField that predicts conditional 3D deformation to align a real-space NeRF to the style space for geometry stylization. Thanks to the StyleField formulation, which already handles geometry stylization well, texture stylization can be achieved conveniently via adaptive style mixing that injects information of the artistic domain into the decoder of the pre-trained 3D GAN. Due to the unique design, our method enables flexible style degree control and shape-texture-specific style swap. Furthermore, we achieve efficient training without any real-world 2D-3D training pairs but proxy samples synthesized from off-the-shelf 2D toonification models.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Optimal Non-Adaptive Cell Probe Dictionaries and Hashing
Authors:
Kasper Green Larsen,
Rasmus Pagh,
Giuseppe Persiano,
Toniann Pitassi,
Kevin Yeo,
Or Zamir
Abstract:
We present a simple and provably optimal non-adaptive cell probe data structure for the static dictionary problem. Our data structure supports storing a set of n key-value pairs from [u]x[u] using s words of space and answering key lookup queries in t = O(lg(u/n)/ lg(s/n)) nonadaptive probes. This generalizes a solution to the membership problem (i.e., where no values are associated with keys) due…
▽ More
We present a simple and provably optimal non-adaptive cell probe data structure for the static dictionary problem. Our data structure supports storing a set of n key-value pairs from [u]x[u] using s words of space and answering key lookup queries in t = O(lg(u/n)/ lg(s/n)) nonadaptive probes. This generalizes a solution to the membership problem (i.e., where no values are associated with keys) due to Buhrman et al. We also present matching lower bounds for the non-adaptive static membership problem in the deterministic setting. Our lower bound implies that both our dictionary algorithm and the preceding membership algorithm are optimal, and in particular that there is an inherent complexity gap in these problems between no adaptivity and one round of adaptivity (with which hashing-based algorithms solve these problems in constant time). Using the ideas underlying our data structure, we also obtain the first implementation of a n-wise independent family of hash functions with optimal evaluation time in the cell probe model.
△ Less
Submitted 19 April, 2024; v1 submitted 30 August, 2023;
originally announced August 2023.
-
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications
Authors:
Kevin Yeo
Abstract:
Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient querying. At a high level, cuckoo hashing maps $n$ items into $b$ entries storing at most $\ell$ items such that each item is placed into one of $k$ randomly chosen entries. Additionally, there is an overflow stash that can store at most $s$ items. Many cryptographic primitives rely upon cuckoo hashi…
▽ More
Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient querying. At a high level, cuckoo hashing maps $n$ items into $b$ entries storing at most $\ell$ items such that each item is placed into one of $k$ randomly chosen entries. Additionally, there is an overflow stash that can store at most $s$ items. Many cryptographic primitives rely upon cuckoo hashing to privately embed and query data where it is integral to ensure small failure probability when constructing cuckoo hashing tables as it directly relates to the privacy guarantees.
As our main result, we present a more query-efficient cuckoo hashing construction using more hash functions. For construction failure probability $ε$, the query overhead of our scheme is $O(1 + \sqrt{\log(1/ε)/\log n})$. Our scheme has quadratically smaller query overhead than prior works for any target failure probability $ε$. We also prove lower bounds matching our construction. Our improvements come from a new understanding of the locality of cuckoo hashing failures for small sets of items.
We also initiate the study of robust cuckoo hashing where the input set may be chosen with knowledge of the hash functions. We present a cuckoo hashing scheme using more hash functions with query overhead $\tilde{O}(\log λ)$ that is robust against poly$(λ)$ adversaries. Furthermore, we present lower bounds showing that this construction is tight and that extending previous approaches of large stashes or entries cannot obtain robustness except with $Ω(n)$ query overhead.
As applications of our results, we obtain improved constructions for batch codes and PIR. In particular, we present the most efficient explicit batch code and blackbox reduction from single-query PIR to batch PIR.
△ Less
Submitted 19 June, 2023;
originally announced June 2023.
-
An End-to-End Time Series Model for Simultaneous Imputation and Forecast
Authors:
Trang H. Tran,
Lam M. Nguyen,
Kyongmin Yeo,
Nam Nguyen,
Dzung Phan,
Roman Vaculin,
Jayant Kalagnanam
Abstract:
Time series forecasting using historical data has been an interesting and challenging topic, especially when the data is corrupted by missing values. In many industrial problem, it is important to learn the inference function between the auxiliary observations and target variables as it provides additional knowledge when the data is not fully observed. We develop an end-to-end time series model th…
▽ More
Time series forecasting using historical data has been an interesting and challenging topic, especially when the data is corrupted by missing values. In many industrial problem, it is important to learn the inference function between the auxiliary observations and target variables as it provides additional knowledge when the data is not fully observed. We develop an end-to-end time series model that aims to learn the such inference relation and make a multiple-step ahead forecast. Our framework trains jointly two neural networks, one to learn the feature-wise correlations and the other for the modeling of temporal behaviors. Our model is capable of simultaneously imputing the missing entries and making a multiple-step ahead prediction. The experiments show good overall performance of our framework over existing methods in both imputation and forecasting tasks.
△ Less
Submitted 1 June, 2023;
originally announced June 2023.
-
Code Will Tell: Visual Identification of Ponzi Schemes on Ethereum
Authors:
Xiaolin Wen,
Kim Siang Yeo,
Yong Wang,
Ling Cheng,
Feida Zhu,
Min Zhu
Abstract:
Ethereum has become a popular blockchain with smart contracts for investors nowadays. Due to the decentralization and anonymity of Ethereum, Ponzi schemes have been easily deployed and caused significant losses to investors. However, there are still no explainable and effective methods to help investors easily identify Ponzi schemes and validate whether a smart contract is actually a Ponzi scheme.…
▽ More
Ethereum has become a popular blockchain with smart contracts for investors nowadays. Due to the decentralization and anonymity of Ethereum, Ponzi schemes have been easily deployed and caused significant losses to investors. However, there are still no explainable and effective methods to help investors easily identify Ponzi schemes and validate whether a smart contract is actually a Ponzi scheme. To fill the research gap, we propose PonziLens, a novel visualization approach to help investors achieve early identification of Ponzi schemes by investigating the operation codes of smart contracts. Specifically, we conduct symbolic execution of opcode and extract the control flow for investing and rewarding with critical opcode instructions. Then, an intuitive directed-graph based visualization is proposed to display the investing and rewarding flows and the crucial execution paths, enabling easy identification of Ponzi schemes on Ethereum. Two usage scenarios involving both Ponzi and non-Ponzi schemes demonstrate the effectiveness of PonziLens.
△ Less
Submitted 14 March, 2023;
originally announced March 2023.
-
Long-term changes in solar activity and irradiance
Authors:
Theodosios Chatzistergos,
Natalie A. Krivova,
Kok Leng Yeo
Abstract:
The Sun is the main energy source to Earth, and understanding its variability is of direct relevance to climate studies. Measurements of total solar irradiance exist since 1978, but this is too short compared to climate-relevant time scales. Coming from a number of different instruments, these measurements require a cross-calibration, which is not straightforward, and thus several composite record…
▽ More
The Sun is the main energy source to Earth, and understanding its variability is of direct relevance to climate studies. Measurements of total solar irradiance exist since 1978, but this is too short compared to climate-relevant time scales. Coming from a number of different instruments, these measurements require a cross-calibration, which is not straightforward, and thus several composite records have been created. All of them suggest a marginally decreasing trend since 1996. Most composites also feature a weak decrease over the entire period of observations, which is also seen in observations of the solar surface magnetic field and is further supported by Ca II K data. Some inconsistencies, however, remain and overall the magnitude and even the presence of the long-term trend remain uncertain. Different models have been developed, which are used to understand the irradiance variability over the satellite period and to extend the records of solar irradiance back in time. Differing in their methodologies, all models require proxies of solar magnetic activity as input. The most widely used proxies are sunspot records and cosmogenic isotope data on centennial and millennial time scale, respectively. None of this, however, offers a sufficiently good, independent description of the long-term evolution of faculae and network responsible for solar brightening. This leads to uncertainty in the amplitude of the long-term changes in solar irradiance. Here we review recent efforts to improve irradiance reconstructions on time scales longer than the solar cycle and to reduce the existing uncertainty in the magnitude of the long-term variability. In particular, we highlight the potential of using 3D magnetohydrodynamical simulations of the solar atmosphere as input to more physical irradiance models and of historical full-disc Ca II K observations encrypting direct facular information back to 1892.
△ Less
Submitted 16 October, 2023; v1 submitted 6 March, 2023;
originally announced March 2023.
-
Inverse Models for Estimating the Initial Condition of Spatio-Temporal Advection-Diffusion Processes
Authors:
Xiao Liu,
Kyongmin Yeo
Abstract:
Inverse problems involve making inference about unknown parameters of a physical process using observational data. This paper investigates an important class of inverse problems -- the estimation of the initial condition of a spatio-temporal advection-diffusion process using spatially sparse data streams. Three spatial sampling schemes are considered, including irregular, non-uniform and shifted u…
▽ More
Inverse problems involve making inference about unknown parameters of a physical process using observational data. This paper investigates an important class of inverse problems -- the estimation of the initial condition of a spatio-temporal advection-diffusion process using spatially sparse data streams. Three spatial sampling schemes are considered, including irregular, non-uniform and shifted uniform sampling. The irregular sampling scheme is the general scenario, while computationally efficient solutions are available in the spectral domain for non-uniform and shifted uniform sampling. For each sampling scheme, the inverse problem is formulated as a regularized convex optimization problem that minimizes the distance between forward model outputs and observations. The optimization problem is solved by the Alternating Direction Method of Multipliers algorithm, which also handles the situation when a linear inequality constraint (e.g., non-negativity) is imposed on the model output. Numerical examples are presented, code is made available on GitHub, and discussions are provided to generate some useful insights of the proposed inverse modeling approaches.
△ Less
Submitted 8 February, 2023;
originally announced February 2023.
-
Multi-task Learning for Source Attribution and Field Reconstruction for Methane Monitoring
Authors:
Arka Daw,
Kyongmin Yeo,
Anuj Karpatne,
Levente Klein
Abstract:
Inferring the source information of greenhouse gases, such as methane, from spatially sparse sensor observations is an essential element in mitigating climate change. While it is well understood that the complex behavior of the atmospheric dispersion of such pollutants is governed by the Advection-Diffusion equation, it is difficult to directly apply the governing equations to identify the source…
▽ More
Inferring the source information of greenhouse gases, such as methane, from spatially sparse sensor observations is an essential element in mitigating climate change. While it is well understood that the complex behavior of the atmospheric dispersion of such pollutants is governed by the Advection-Diffusion equation, it is difficult to directly apply the governing equations to identify the source location and magnitude (inverse problem) because of the spatially sparse and noisy observations, i.e., the pollution concentration is known only at the sensor locations and sensors sensitivity is limited. Here, we develop a multi-task learning framework that can provide high-fidelity reconstruction of the concentration field and identify emission characteristics of the pollution sources such as their location, emission strength, etc. from sparse sensor observations. We demonstrate that our proposed framework is able to achieve accurate reconstruction of the methane concentrations from sparse sensor measurements as well as precisely pin-point the location and emission strength of these pollution sources.
△ Less
Submitted 2 November, 2022;
originally announced November 2022.
-
Abductive Action Inference
Authors:
Clement Tan,
Chai Kiat Yeo,
Cheston Tan,
Basura Fernando
Abstract:
Abductive reasoning aims to make the most likely inference for a given set of incomplete observations. In this paper, we introduce a novel research task known as "abductive action inference" which addresses the question of which actions were executed by a human to reach a specific state shown in a single snapshot. The research explores three key abductive inference problems: action set prediction,…
▽ More
Abductive reasoning aims to make the most likely inference for a given set of incomplete observations. In this paper, we introduce a novel research task known as "abductive action inference" which addresses the question of which actions were executed by a human to reach a specific state shown in a single snapshot. The research explores three key abductive inference problems: action set prediction, action sequence prediction, and abductive action verification. To tackle these challenging tasks, we investigate various models, including established ones such as Transformers, Graph Neural Networks, CLIP, BLIP, GPT3, end-to-end trained Slow-Fast, Resnet50-3D, and ViT models. Furthermore, the paper introduces several innovative models tailored for abductive action inference, including a relational graph neural network, a relational bilinear pooling model, a relational rule-based inference model, a relational GPT-3 prompt method, and a relational Transformer model. Notably, the newly proposed object-relational bilinear graph encoder-decoder (BiGED) model emerges as the most effective among all methods evaluated, demonstrating good proficiency in handling the intricacies of the Action Genome dataset. The contributions of this research offer significant progress toward comprehending the implications of human actions and making highly plausible inferences concerning the outcomes of these actions.
△ Less
Submitted 7 August, 2023; v1 submitted 24 October, 2022;
originally announced October 2022.
-
Monocular 3D Object Reconstruction with GAN Inversion
Authors:
Junzhe Zhang,
Daxuan Ren,
Zhongang Cai,
Chai Kiat Yeo,
Bo Dai,
Chen Change Loy
Abstract:
Recovering a textured 3D mesh from a monocular image is highly challenging, particularly for in-the-wild objects that lack 3D ground truths. In this work, we present MeshInversion, a novel framework to improve the reconstruction by exploiting the generative prior of a 3D GAN pre-trained for 3D textured mesh synthesis. Reconstruction is achieved by searching for a latent space in the 3D GAN that be…
▽ More
Recovering a textured 3D mesh from a monocular image is highly challenging, particularly for in-the-wild objects that lack 3D ground truths. In this work, we present MeshInversion, a novel framework to improve the reconstruction by exploiting the generative prior of a 3D GAN pre-trained for 3D textured mesh synthesis. Reconstruction is achieved by searching for a latent space in the 3D GAN that best resembles the target mesh in accordance with the single view observation. Since the pre-trained GAN encapsulates rich 3D semantics in terms of mesh geometry and texture, searching within the GAN manifold thus naturally regularizes the realness and fidelity of the reconstruction. Importantly, such regularization is directly applied in the 3D space, providing crucial guidance of mesh parts that are unobserved in the 2D space. Experiments on standard benchmarks show that our framework obtains faithful 3D reconstructions with consistent geometry and texture across both observed and unobserved parts. Moreover, it generalizes well to meshes that are less commonly seen, such as the extended articulation of deformable objects. Code is released at https://github.com/junzhezhang/mesh-inversion
△ Less
Submitted 20 July, 2022;
originally announced July 2022.
-
Super Resolution for Turbulent Flows in 2D: Stabilized Physics Informed Neural Networks
Authors:
Mykhaylo Zayats,
Małgorzata J. Zimoń,
Kyongmin Yeo,
Sergiy Zhuk
Abstract:
We propose a new design of a neural network for solving a zero shot super resolution problem for turbulent flows. We embed Luenberger-type observer into the network's architecture to inform the network of the physics of the process, and to provide error correction and stabilization mechanisms. In addition, to compensate for decrease of observer's performance due to the presence of unknown destabil…
▽ More
We propose a new design of a neural network for solving a zero shot super resolution problem for turbulent flows. We embed Luenberger-type observer into the network's architecture to inform the network of the physics of the process, and to provide error correction and stabilization mechanisms. In addition, to compensate for decrease of observer's performance due to the presence of unknown destabilizing forcing, the network is designed to estimate the contribution of the unknown forcing implicitly from the data over the course of training. By running a set of numerical experiments, we demonstrate that the proposed network does recover unknown forcing from data and is capable of predicting turbulent flows in high resolution from low resolution noisy observations.
△ Less
Submitted 15 April, 2022;
originally announced April 2022.
-
SoK: SCT Auditing in Certificate Transparency
Authors:
Sarah Meiklejohn,
Joe DeBlasio,
Devon O'Brien,
Chris Thompson,
Kevin Yeo,
Emily Stark
Abstract:
The Web public key infrastructure is essential to providing secure communication on the Internet today, and certificate authorities play a crucial role in this ecosystem by issuing certificates. These authorities may misissue certificates or suffer misuse attacks, however, which has given rise to the Certificate Transparency (CT) project. The goal of CT is to store all issued certificates in publi…
▽ More
The Web public key infrastructure is essential to providing secure communication on the Internet today, and certificate authorities play a crucial role in this ecosystem by issuing certificates. These authorities may misissue certificates or suffer misuse attacks, however, which has given rise to the Certificate Transparency (CT) project. The goal of CT is to store all issued certificates in public logs, which can then be checked for the presence of potentially misissued certificates. Thus, the requirement that a given certificate is indeed in one (or several) of these logs lies at the core of CT. In its current deployment, however, most individual clients do not check that the certificates they see are in logs, as requesting a proof of inclusion directly reveals the certificate and thus creates the clear potential for a violation of that client's privacy. In this paper, we explore the techniques that have been proposed for privacy-preserving auditing of certificate inclusion, focusing on their effectiveness, efficiency, and suitability in a near-term deployment. In doing so, we also explore the parallels with related problems involving browser clients. Guided by a set of constraints that we develop, we ultimately observe several key limitations in many proposals, ranging from their privacy provisions to the fact that they focus on the interaction between a client and a log but leave open the question of how a client could privately report any certificates that are missing.
△ Less
Submitted 3 March, 2022;
originally announced March 2022.
-
NSGZero: Efficiently Learning Non-Exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree Search
Authors:
Wanqi Xue,
Bo An,
Chai Kiat Yeo
Abstract:
How resources are deployed to secure critical targets in networks can be modelled by Network Security Games (NSGs). While recent advances in deep learning (DL) provide a powerful approach to dealing with large-scale NSGs, DL methods such as NSG-NFSP suffer from the problem of data inefficiency. Furthermore, due to centralized control, they cannot scale to scenarios with a large number of resources…
▽ More
How resources are deployed to secure critical targets in networks can be modelled by Network Security Games (NSGs). While recent advances in deep learning (DL) provide a powerful approach to dealing with large-scale NSGs, DL methods such as NSG-NFSP suffer from the problem of data inefficiency. Furthermore, due to centralized control, they cannot scale to scenarios with a large number of resources. In this paper, we propose a novel DL-based method, NSGZero, to learn a non-exploitable policy in NSGs. NSGZero improves data efficiency by performing planning with neural Monte Carlo Tree Search (MCTS). Our main contributions are threefold. First, we design deep neural networks (DNNs) to perform neural MCTS in NSGs. Second, we enable neural MCTS with decentralized control, making NSGZero applicable to NSGs with many resources. Third, we provide an efficient learning paradigm, to achieve joint training of the DNNs in NSGZero. Compared to state-of-the-art algorithms, our method achieves significantly better data efficiency and scalability.
△ Less
Submitted 17 January, 2022;
originally announced January 2022.
-
S3RP: Self-Supervised Super-Resolution and Prediction for Advection-Diffusion Process
Authors:
Chulin Wang,
Kyongmin Yeo,
Xiao **,
Andres Codas,
Levente J. Klein,
Bruce Elmegreen
Abstract:
We present a super-resolution model for an advection-diffusion process with limited information. While most of the super-resolution models assume high-resolution (HR) ground-truth data in the training, in many cases such HR dataset is not readily accessible. Here, we show that a Recurrent Convolutional Network trained with physics-based regularizations is able to reconstruct the HR information wit…
▽ More
We present a super-resolution model for an advection-diffusion process with limited information. While most of the super-resolution models assume high-resolution (HR) ground-truth data in the training, in many cases such HR dataset is not readily accessible. Here, we show that a Recurrent Convolutional Network trained with physics-based regularizations is able to reconstruct the HR information without having the HR ground-truth data. Moreover, considering the ill-posed nature of a super-resolution problem, we employ the Recurrent Wasserstein Autoencoder to model the uncertainty.
△ Less
Submitted 8 November, 2021;
originally announced November 2021.
-
Generative Adversarial Network for Probabilistic Forecast of Random Dynamical System
Authors:
Kyongmin Yeo,
Zan Li,
Wesley M. Gifford
Abstract:
We present a deep learning model for data-driven simulations of random dynamical systems without a distributional assumption. The deep learning model consists of a recurrent neural network, which aims to learn the time marching structure, and a generative adversarial network (GAN) to learn and sample from the probability distribution of the random dynamical system. Although GANs provide a powerful…
▽ More
We present a deep learning model for data-driven simulations of random dynamical systems without a distributional assumption. The deep learning model consists of a recurrent neural network, which aims to learn the time marching structure, and a generative adversarial network (GAN) to learn and sample from the probability distribution of the random dynamical system. Although GANs provide a powerful tool to model a complex probability distribution, the training often fails without a proper regularization. Here, we propose a regularization strategy for a GAN based on consistency conditions for the sequential inference problems. First, the maximum mean discrepancy (MMD) is used to enforce the consistency between conditional and marginal distributions of a stochastic process. Then, the marginal distributions of the multiple-step predictions are regularized by using MMD or from multiple discriminators. The behavior of the proposed model is studied by using three stochastic processes with complex noise structures.
△ Less
Submitted 11 April, 2022; v1 submitted 4 November, 2021;
originally announced November 2021.
-
The relationship between bipolar magnetic regions and their sunspots
Authors:
K. L. Yeo,
S. K. Solanki,
N. A. Krivova,
J. Jiang
Abstract:
The relationship between bipolar magnetic regions (BMRs) and their sunspots is an important property of the solar magnetic field, but it is not well constrained. One consequence is that it is a challenge for surface flux transport models (SFTMs) based on sunspot observations to determine the details of BMR emergence, which they require as input, from such data. We aimed to establish the relationsh…
▽ More
The relationship between bipolar magnetic regions (BMRs) and their sunspots is an important property of the solar magnetic field, but it is not well constrained. One consequence is that it is a challenge for surface flux transport models (SFTMs) based on sunspot observations to determine the details of BMR emergence, which they require as input, from such data. We aimed to establish the relationship between the amount of magnetic flux in newly emerged BMRs and the area of the enclosed sunspots. Earlier attempts to constrain BMR magnetic flux were hindered by the fact that there is no proper database of the magnetic and physical properties of newly emerged BMRs currently available. We made use of the empirical model of the relationship between the disc-integrated facular and network magnetic flux and the total surface coverage by sunspots reported in a recent study. The structure of the model is such that it enabled us to establish, from these disc-integrated quantities, an empirical relationship between the magnetic flux and sunspot area of individual newly emerged BMRs, circumventing the lack of any proper BMR database. Applying the constraint on BMR magnetic flux derived here to an established SFTM retained its ability to replicate various independent datasets and the correlation between the model output polar field at the end of each cycle and the observed strength of the following cycle. The SFTM output indicates that facular and network magnetic flux rises with increasing sunspot magnetic flux at a slowing rate such that it appears to gradually saturate, analogous to earlier studies. The activity dependence of the ratio of facular and network flux to sunspot flux is consistent with the findings of recent studies: although the Sun is faculae-dominated, it is only marginally so as facular and network brightening and sunspot darkening appear to be closely balanced.
△ Less
Submitted 29 September, 2021;
originally announced September 2021.
-
Reconstructing solar irradiance from historical Ca II K observations. I. Method and its validation
Authors:
Theodosios Chatzistergos,
Natalie A. Krivova,
Ilaria Ermolli,
Kok Leng Yeo,
Sudip Mandal,
Sami K. Solanki,
Greg Kopp,
Jean-Marie Malherbe
Abstract:
Knowledge of solar irradiance variability is critical to Earth's climate models and understanding the solar influence on Earth's climate. Direct solar irradiance measurements are only available since 1978. Reconstructions of past variability typically rely on sunspot data. These provide only indirect information on the facular and network regions, which are decisive contributors to irradiance vari…
▽ More
Knowledge of solar irradiance variability is critical to Earth's climate models and understanding the solar influence on Earth's climate. Direct solar irradiance measurements are only available since 1978. Reconstructions of past variability typically rely on sunspot data. These provide only indirect information on the facular and network regions, which are decisive contributors to irradiance variability on timescales of the solar cycle and longer. Our ultimate goal is to reconstruct past solar irradiance variations using historical full-disc Ca II K observations to describe the facular contribution independently of sunspot observations. Here, we develop the method and test it extensively by using modern CCD-based Ca II K observations and carry out initial tests on two photographic archives. We employ carefully reduced and calibrated Ca II K images from 13 datasets, such as those from the Meudon, Mt Wilson, and Rome observatories. We convert them to unsigned magnetograms and then use them as input to the adapted SATIRE model to reconstruct TSI variations over the period 1978-2019, for which direct irradiance measurements are available. The reconstructed TSI from the analysed Ca II K archives agrees well with direct TSI measurements and existing reconstructions. The model also returns good results on data taken with different bandpasses and images with low spatial resolution. Historical Ca II K archives suffer from numerous inconsistencies, but we show that these archives can still be used to reconstruct TSI with reasonable accuracy provided the observations are accurately processed. By using the unsigned magnetograms of the Sun reconstructed from high-quality Ca II K observations as input into the SATIRE model, we can reconstruct solar irradiance variations nearly as accurately as from directly recorded magnetograms.
△ Less
Submitted 13 September, 2021;
originally announced September 2021.
-
Coupling disorder in a population of swarmalators
Authors:
Hyunsuk Hong,
Kangmo Yeo,
Hyun Keun Lee
Abstract:
We consider a population of two-dimensional oscillators with random couplings, and explore the collective states. The coupling strength between oscillators is randomly quenched with two values one of which is positive while the other is negative, and the oscillators can spatially {\it{move}} depending on the state variables for phase and position. We find that the system shows the phase transition…
▽ More
We consider a population of two-dimensional oscillators with random couplings, and explore the collective states. The coupling strength between oscillators is randomly quenched with two values one of which is positive while the other is negative, and the oscillators can spatially {\it{move}} depending on the state variables for phase and position. We find that the system shows the phase transition from the incoherent state to the fully synchronized one at a proper ratio of the number of positive couplings to the total. The threshold is numerically measured, and analytically predicted by the linear stability analysis of the fully synchronized state. It is found that the random couplings induces the long-term state patterns appearing for constant strength. The oscillators move to the places where the randomly quenched couplings work as if annealed. We further observe that the system with mixed randomnesses for quenched couplings shows the combination of the deformed patterns understandable with each annealed averages.
△ Less
Submitted 29 October, 2021; v1 submitted 31 August, 2021;
originally announced August 2021.
-
Mis-spoke or mis-lead: Achieving Robustness in Multi-Agent Communicative Reinforcement Learning
Authors:
Wanqi Xue,
Wei Qiu,
Bo An,
Zinovi Rabinovich,
Svetlana Obraztsova,
Chai Kiat Yeo
Abstract:
Recent studies in multi-agent communicative reinforcement learning (MACRL) have demonstrated that multi-agent coordination can be greatly improved by allowing communication between agents. Meanwhile, adversarial machine learning (ML) has shown that ML models are vulnerable to attacks. Despite the increasing concern about the robustness of ML algorithms, how to achieve robust communication in multi…
▽ More
Recent studies in multi-agent communicative reinforcement learning (MACRL) have demonstrated that multi-agent coordination can be greatly improved by allowing communication between agents. Meanwhile, adversarial machine learning (ML) has shown that ML models are vulnerable to attacks. Despite the increasing concern about the robustness of ML algorithms, how to achieve robust communication in multi-agent reinforcement learning has been largely neglected. In this paper, we systematically explore the problem of adversarial communication in MACRL. Our main contributions are threefold. First, we propose an effective method to perform attacks in MACRL, by learning a model to generate optimal malicious messages. Second, we develop a defence method based on message reconstruction, to maintain multi-agent coordination under message attacks. Third, we formulate the adversarial communication problem as a two-player zero-sum game and propose a game-theoretical method R-MACRL to improve the worst-case defending performance. Empirical results demonstrate that many state-of-the-art MACRL methods are vulnerable to message attacks, and our method can significantly improve their robustness.
△ Less
Submitted 26 January, 2022; v1 submitted 9 August, 2021;
originally announced August 2021.
-
Solving Large-Scale Extensive-Form Network Security Games via Neural Fictitious Self-Play
Authors:
Wanqi Xue,
Youzhi Zhang,
Shuxin Li,
Xinrun Wang,
Bo An,
Chai Kiat Yeo
Abstract:
Securing networked infrastructures is important in the real world. The problem of deploying security resources to protect against an attacker in networked domains can be modeled as Network Security Games (NSGs). Unfortunately, existing approaches, including the deep learning-based approaches, are inefficient to solve large-scale extensive-form NSGs. In this paper, we propose a novel learning parad…
▽ More
Securing networked infrastructures is important in the real world. The problem of deploying security resources to protect against an attacker in networked domains can be modeled as Network Security Games (NSGs). Unfortunately, existing approaches, including the deep learning-based approaches, are inefficient to solve large-scale extensive-form NSGs. In this paper, we propose a novel learning paradigm, NSG-NFSP, to solve large-scale extensive-form NSGs based on Neural Fictitious Self-Play (NFSP). Our main contributions include: i) reforming the best response (BR) policy network in NFSP to be a map** from action-state pair to action-value, to make the calculation of BR possible in NSGs; ii) converting the average policy network of an NFSP agent into a metric-based classifier, hel** the agent to assign distributions only on legal actions rather than all actions; iii) enabling NFSP with high-level actions, which can benefit training efficiency and stability in NSGs; and iv) leveraging information contained in graphs of NSGs by learning efficient graph node embeddings. Our algorithm significantly outperforms state-of-the-art algorithms in both scalability and solution quality.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Unsupervised 3D Shape Completion through GAN Inversion
Authors:
Junzhe Zhang,
Xinyi Chen,
Zhongang Cai,
Liang Pan,
Haiyu Zhao,
Shuai Yi,
Chai Kiat Yeo,
Bo Dai,
Chen Change Loy
Abstract:
Most 3D shape completion approaches rely heavily on partial-complete shape pairs and learn in a fully supervised manner. Despite their impressive performances on in-domain data, when generalizing to partial shapes in other forms or real-world partial scans, they often obtain unsatisfactory results due to domain gaps. In contrast to previous fully supervised approaches, in this paper we present Sha…
▽ More
Most 3D shape completion approaches rely heavily on partial-complete shape pairs and learn in a fully supervised manner. Despite their impressive performances on in-domain data, when generalizing to partial shapes in other forms or real-world partial scans, they often obtain unsatisfactory results due to domain gaps. In contrast to previous fully supervised approaches, in this paper we present ShapeInversion, which introduces Generative Adversarial Network (GAN) inversion to shape completion for the first time. ShapeInversion uses a GAN pre-trained on complete shapes by searching for a latent code that gives a complete shape that best reconstructs the given partial input. In this way, ShapeInversion no longer needs paired training data, and is capable of incorporating the rich prior captured in a well-trained generative model. On the ShapeNet benchmark, the proposed ShapeInversion outperforms the SOTA unsupervised method, and is comparable with supervised methods that are learned using paired data. It also demonstrates remarkable generalization ability, giving robust results for real-world scans and partial inputs of various forms and incompleteness levels. Importantly, ShapeInversion naturally enables a series of additional abilities thanks to the involvement of a pre-trained GAN, such as producing multiple valid complete shapes for an ambiguous partial input, as well as shape manipulation and interpolation.
△ Less
Submitted 29 April, 2021; v1 submitted 27 April, 2021;
originally announced April 2021.
-
Modeling stellar Ca II H & K emission variations. I. Effect of inclination on the S-index
Authors:
K. Sowmya,
A. I. Shapiro,
V. Witzke,
N. -E. Nèmec,
T. Chatzistergos,
K. L. Yeo,
N. A. Krivova,
S. K. Solanki
Abstract:
The emission in the near ultraviolet Ca II H & K lines is modulated by stellar magnetic activity. Although this emission, quantified via the S-index, has been serving as a prime proxy of stellar magnetic activity for several decades, many aspects of the complex relation between stellar magnetism and Ca II H & K emission are still unclear. The amount of measured Ca II H & K emission is suspected to…
▽ More
The emission in the near ultraviolet Ca II H & K lines is modulated by stellar magnetic activity. Although this emission, quantified via the S-index, has been serving as a prime proxy of stellar magnetic activity for several decades, many aspects of the complex relation between stellar magnetism and Ca II H & K emission are still unclear. The amount of measured Ca II H & K emission is suspected to be affected not only by the stellar intrinsic properties but also by the inclination angle of the stellar rotation axis. Until now such an inclination effect on S-index has remained largely unexplored. To fill this gap, we develop a physics-based model to calculate S-index, focusing on the Sun. Using the distributions of solar magnetic features derived from observations together with Ca II H & K spectra synthesized in non-local thermodynamic equilibrium, we validate our model by successfully reconstructing the observed variations of solar S-index over four activity cycles. Further, using the distribution of magnetic features over the visible solar disk obtained from surface flux transport simulations, we obtain S-index time series dating back to 1700 and investigate the effect of inclination on S-index variability, both on the magnetic activity cycle and the rotational timescales. We find that when going from an equatorial to a pole-on view, the amplitude of S-index variations decreases weakly on the activity cycle timescale and strongly on the rotational timescale (by about 22% and 81%, respectively, for a cycle of intermediate strength). The absolute value of S-index depends only weakly on the inclination. We provide analytical expressions that model such dependencies.
△ Less
Submitted 25 March, 2021;
originally announced March 2021.
-
Collective steady-state patterns of swarmalators with finite-cutoff interaction distance
Authors:
Hyun Keun Lee,
Kangmo Yeo,
Hyunsuk Hong
Abstract:
We study the steady-state patterns of population of the coupled oscillators that sync and swarm, where the interaction distances among oscillators have finite-cutoff in interaction distance. We examine how the static patterns known in the infinite-cutoff are reproduced or deformed, and explore a new static pattern that does not appear until a finite-cutoff is considered. All steady-state patterns…
▽ More
We study the steady-state patterns of population of the coupled oscillators that sync and swarm, where the interaction distances among oscillators have finite-cutoff in interaction distance. We examine how the static patterns known in the infinite-cutoff are reproduced or deformed, and explore a new static pattern that does not appear until a finite-cutoff is considered. All steady-state patterns of the infinite-cutoff, static sync, static async, and static phase wave are respectively repeated in space for proper finite-cutoff ranges. Their deformation in shape and density takes place for the other finite-cutoff ranges. Bar-like phase wave states are observed, which has not been the case for the infinite-cutoff. All the patterns are investigated via numerical and theoretical analysis.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Intensity contrast of solar network and faculae -- II. Implications for solar irradiance modelling
Authors:
K. L. Yeo,
N. A. Krivova
Abstract:
We aim to gain insight into the effect of network and faculae on solar irradiance from their apparent intensity. Taking full-disc observations from the Solar Dynamics Observatory, we examined the intensity contrast of network and faculae in the continuum and core of the Fe I 6173 Å line and 1700 Å, including the variation with magnetic flux density, distance from disc centre, nearby magnetic field…
▽ More
We aim to gain insight into the effect of network and faculae on solar irradiance from their apparent intensity. Taking full-disc observations from the Solar Dynamics Observatory, we examined the intensity contrast of network and faculae in the continuum and core of the Fe I 6173 Å line and 1700 Å, including the variation with magnetic flux density, distance from disc centre, nearby magnetic fields, and time. The brightness of network and faculae is believed to be suppressed by nearby magnetic fields from its effect on convection. The difference in intensity contrast between the quiet-Sun network and active region faculae, noted by various studies, arises because active regions are more magnetically crowded and is not due to any fundamental physical differences between network and faculae. These results highlight that solar irradiance models need to include the effect of nearby magnetic fields on network and faculae brightness. We found evidence that suggests that departures from local thermal equilibrium (LTE) might have limited effect on intensity contrast. This could explain why solar irradiance models that are based on the intensity contrast of solar surface magnetic features calculated assuming LTE reproduce the observed spectral variability even where the LTE assumption breaks down. Certain models of solar irradiance employ chromospheric indices as direct indications of the effect of network and faculae on solar irradiance. Based on past studies of the Ca II K line and on the intensity contrast measurements derived here, we show that the fluctuations in chromospheric emission from network and faculae are a reasonable estimate of the emission fluctuations in the middle photosphere, but not of those in the lower photosphere. The data set, which extends from 2010 to 2018, indicates that intensity contrast was stable to about 3% in this period.
△ Less
Submitted 18 February, 2021;
originally announced February 2021.
-
The Dimmest State of the Sun
Authors:
K. L. Yeo,
S. K. Solanki,
N. A. Krivova,
M. Rempel,
L. S. Anusha,
A. I. Shapiro,
R. V. Tagirov,
V. Witzke
Abstract:
How the solar electromagnetic energy entering the Earth's atmosphere varied since pre-industrial times is an important consideration in the climate change debate. Detrimental to this debate, estimates of the change in total solar irradiance (TSI) since the Maunder minimum, an extended period of weak solar activity preceding the industrial revolution, differ markedly, ranging from a drop of 0.75 Wm…
▽ More
How the solar electromagnetic energy entering the Earth's atmosphere varied since pre-industrial times is an important consideration in the climate change debate. Detrimental to this debate, estimates of the change in total solar irradiance (TSI) since the Maunder minimum, an extended period of weak solar activity preceding the industrial revolution, differ markedly, ranging from a drop of 0.75 Wm-2 to a rise of 6.3 Wm-2. Consequently, the exact contribution by solar forcing to the rise in global temperatures over the past centuries remains inconclusive. Adopting a novel approach based on state-of-the-art solar imagery and numerical simulations, we establish the TSI level of the Sun when it is in its least-active state to be 2.0 +/- 0.7 Wm-2 below the 2019 level. This means TSI could not have risen since the Maunder minimum by more than this amount, thus restricting the possible role of solar forcing in global warming.
△ Less
Submitted 18 February, 2021;
originally announced February 2021.
-
Automated Deep Learning Analysis of Angiography Video Sequences for Coronary Artery Disease
Authors:
Chengyang Zhou,
Thao Vy Dinh,
Heyi Kong,
Jonathan Yap,
Khung Keong Yeo,
Hwee Kuan Lee,
Kaicheng Liang
Abstract:
The evaluation of obstructions (stenosis) in coronary arteries is currently done by a physician's visual assessment of coronary angiography video sequences. It is laborious, and can be susceptible to interobserver variation. Prior studies have attempted to automate this process, but few have demonstrated an integrated suite of algorithms for the end-to-end analysis of angiograms. We report an auto…
▽ More
The evaluation of obstructions (stenosis) in coronary arteries is currently done by a physician's visual assessment of coronary angiography video sequences. It is laborious, and can be susceptible to interobserver variation. Prior studies have attempted to automate this process, but few have demonstrated an integrated suite of algorithms for the end-to-end analysis of angiograms. We report an automated analysis pipeline based on deep learning to rapidly and objectively assess coronary angiograms, highlight coronary vessels of interest, and quantify potential stenosis. We propose a 3-stage automated analysis method consisting of key frame extraction, vessel segmentation, and stenosis measurement. We combined powerful deep learning approaches such as ResNet and U-Net with traditional image processing and geometrical analysis. We trained and tested our algorithms on the Left Anterior Oblique (LAO) view of the right coronary artery (RCA) using anonymized angiograms obtained from a tertiary cardiac institution, then tested the generalizability of our technique to the Right Anterior Oblique (RAO) view. We demonstrated an overall improvement on previous work, with key frame extraction top-5 precision of 98.4%, vessel segmentation F1-Score of 0.891 and stenosis measurement 20.7% Type I Error rate.
△ Less
Submitted 29 January, 2021;
originally announced January 2021.
-
Coherent wave control in complex media with arbitrary wavefronts
Authors:
Philipp del Hougne,
K. Brahima Yeo,
Philippe Besnier,
Matthieu Davy
Abstract:
Wavefront sha** (WFS) has emerged as powerful tool to control the propagation of diverse wave phenomena (light, sound, microwaves, ...) in disordered matter for applications including imaging, communication, energy transfer, micromanipulation, and scattering anomalies. Nonetheless, in practice the necessary coherent control of multiple input channels remains a vexing problem. Here, we overcome t…
▽ More
Wavefront sha** (WFS) has emerged as powerful tool to control the propagation of diverse wave phenomena (light, sound, microwaves, ...) in disordered matter for applications including imaging, communication, energy transfer, micromanipulation, and scattering anomalies. Nonetheless, in practice the necessary coherent control of multiple input channels remains a vexing problem. Here, we overcome this difficulty by do** the disordered medium with programmable meta-atoms in order to adapt it to an imposed arbitrary incoming wavefront. Besides lifting the need for carefully shaped incident wavefronts, our approach also unlocks new opportunities such as sequentially achieving different functionalities with the same arbitrary wavefront. We demonstrate our concept experimentally for electromagnetic waves using programmable metasurfaces in a chaotic cavity, with applications to focusing with the generalized Wigner-Smith operator as well as coherent perfect absorption. We expect our fundamentally new perspective on coherent wave control to facilitate the transition of intricate WFS protocols into real applications for various wave phenomena.
△ Less
Submitted 18 February, 2021; v1 submitted 23 October, 2020;
originally announced November 2020.
-
On-demand coherent perfect absorption in complex scattering systems: time delay divergence and enhanced sensitivity to perturbations
Authors:
Philipp del Hougne,
K. Brahima Yeo,
Philippe Besnier,
Matthieu Davy
Abstract:
Non-Hermitian photonic systems capable of perfectly absorbing incident radiation recently attracted much attention both because fundamentally they correspond to an exotic scattering phenomenon (a real-valued scattering matrix zero) and because their extreme sensitivity holds great technological promise. The sharp reflection dip is a hallmark feature underlying many envisioned applications in preci…
▽ More
Non-Hermitian photonic systems capable of perfectly absorbing incident radiation recently attracted much attention both because fundamentally they correspond to an exotic scattering phenomenon (a real-valued scattering matrix zero) and because their extreme sensitivity holds great technological promise. The sharp reflection dip is a hallmark feature underlying many envisioned applications in precision sensing, secure communication and wave filtering. However, a rigorous link between the underlying scattering anomaly and the sensitivity of the system to a perturbation is still missing. Here, we develop a theoretical description in complex scattering systems which quantitatively explains the shape of the reflection dip. We further demonstrate that coherent perfect absorption (CPA) is associated with a phase singularity and we relate the sign of the diverging time delay to the mismatch between excitation rate and intrinsic decay rate. We confirm our theoretical predictions in experiments based on a three-dimensional chaotic cavity excited by eight channels. Rather than relying on operation frequency and attenuation inside the system to be two free parameters, we achieve "on-demand" CPA at an arbitrary frequency by tweaking the chaotic cavity's scattering properties with programmable meta-atom inclusions. Finally, we theoretically prove and experimentally verify the optimal sensitivity of the CPA condition to minute perturbations of the system.
△ Less
Submitted 30 September, 2020;
originally announced October 2020.
-
Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection
Authors:
Yang Chen,
Nami Ashizawa,
Seanglidet Yean,
Chai Kiat Yeo,
Naoto Yanai
Abstract:
In the information age, a secure and stable network environment is essential and hence intrusion detection is critical for any networks. In this paper, we propose a self-organizing map assisted deep autoencoding Gaussian mixture model (SOMDAGMM) supplemented with well-preserved input space topology for more accurate network intrusion detection. The deep autoencoding Gaussian mixture model comprise…
▽ More
In the information age, a secure and stable network environment is essential and hence intrusion detection is critical for any networks. In this paper, we propose a self-organizing map assisted deep autoencoding Gaussian mixture model (SOMDAGMM) supplemented with well-preserved input space topology for more accurate network intrusion detection. The deep autoencoding Gaussian mixture model comprises a compression network and an estimation network which is able to perform unsupervised joint training. However, the code generated by the autoencoder is inept at preserving the topology of the input space, which is rooted in the bottleneck of the adopted deep structure. A self-organizing map has been introduced to construct SOMDAGMM for addressing this issue. The superiority of the proposed SOM-DAGMM is empirically demonstrated with extensive experiments conducted upon two datasets. Experimental results show that SOM-DAGMM outperforms state-of-the-art DAGMM on all tests, and achieves up to 15.58% improvement in F1 score and with better stability.
△ Less
Submitted 28 August, 2020;
originally announced August 2020.
-
MessyTable: Instance Association in Multiple Camera Views
Authors:
Zhongang Cai,
Junzhe Zhang,
Daxuan Ren,
Cunjun Yu,
Haiyu Zhao,
Shuai Yi,
Chai Kiat Yeo,
Chen Change Loy
Abstract:
We present an interesting and challenging dataset that features a large number of scenes with messy tables captured from multiple camera views. Each scene in this dataset is highly complex, containing multiple object instances that could be identical, stacked and occluded by other instances. The key challenge is to associate all instances given the RGB image of all views. The seemingly simple task…
▽ More
We present an interesting and challenging dataset that features a large number of scenes with messy tables captured from multiple camera views. Each scene in this dataset is highly complex, containing multiple object instances that could be identical, stacked and occluded by other instances. The key challenge is to associate all instances given the RGB image of all views. The seemingly simple task surprisingly fails many popular methods or heuristics that we assume good performance in object association. The dataset challenges existing methods in mining subtle appearance differences, reasoning based on contexts, and fusing appearance with geometric cues for establishing an association. We report interesting findings with some popular baselines, and discuss how this dataset could help inspire new problems and catalyse more robust formulations to tackle real-world instance association problems. Project page: $\href{https://caizhongang.github.io/projects/MessyTable/}{\text{MessyTable}}$
△ Less
Submitted 29 July, 2020;
originally announced July 2020.
-
How faculae and network relate to sunspots, and the implications for solar and stellar brightness variations
Authors:
K. L. Yeo,
S. K. Solanki,
N. A. Krivova
Abstract:
How global faculae and network coverage relates to that of sunspots is relevant to the brightness variations of the Sun and Sun-like stars. We extend earlier studies that found the facular-to-sunspot-area ratio diminishes with total sunspot coverage. Chromospheric indices and the total magnetic flux enclosed in network and faculae, referred to here as 'facular indices', are modulated by the amount…
▽ More
How global faculae and network coverage relates to that of sunspots is relevant to the brightness variations of the Sun and Sun-like stars. We extend earlier studies that found the facular-to-sunspot-area ratio diminishes with total sunspot coverage. Chromospheric indices and the total magnetic flux enclosed in network and faculae, referred to here as 'facular indices', are modulated by the amount of facular and network present. We probed the relationship between various facular and sunspot indices through an empirical model that takes into account how active regions evolve. This model was incorporated into a total solar irradiance (TSI) model. The model presented here replicates most of the observed variability in the facular indices, and is better at doing so than earlier models. Contrary to recent studies, we found the relationship between the facular and sunspot indices to be stable over the past four decades. The model indicates that, like the facular-to-sunspot-area ratio, the ratio of the variation in chromospheric emission and total network and facular magnetic flux to sunspot area decreases with the latter. The TSI model indicates the ratio of the TSI excess from faculae and network to the deficit from sunspots also declines with sunspot area, with the consequence being that TSI rises with sunspot area more slowly than if the two quantities were linearly proportional to one another. The extrapolation of the TSI model to higher activity levels indicates that in the activity range where Sun-like stars are observed to switch from growing brighter with increasing activity to becoming dimmer instead, the activity-dependence of TSI exhibits a similar transition as sunspot darkening starts to rise more rapidly with activity than facular brightening. This bolsters the interpretation of this behavior of Sun-like stars as the transition from a faculae-dominated to a spot-dominated regime.
△ Less
Submitted 5 October, 2020; v1 submitted 25 June, 2020;
originally announced June 2020.
-
Variational inference formulation for a model-free simulation of a dynamical system with unknown parameters by a recurrent neural network
Authors:
Kyongmin Yeo,
Dylan E. C. Grullon,
Fan-Keng Sun,
Duane S. Boning,
Jayant R. Kalagnanam
Abstract:
We propose a recurrent neural network for a "model-free" simulation of a dynamical system with unknown parameters without prior knowledge. The deep learning model aims to jointly learn the nonlinear time marching operator and the effects of the unknown parameters from a time series dataset. We assume that the time series data set consists of an ensemble of trajectories for a range of the parameter…
▽ More
We propose a recurrent neural network for a "model-free" simulation of a dynamical system with unknown parameters without prior knowledge. The deep learning model aims to jointly learn the nonlinear time marching operator and the effects of the unknown parameters from a time series dataset. We assume that the time series data set consists of an ensemble of trajectories for a range of the parameters. The learning task is formulated as a statistical inference problem by considering the unknown parameters as random variables. A latent variable is introduced to model the effects of the unknown parameters, and a variational inference method is employed to simultaneously train probabilistic models for the time marching operator and an approximate posterior distribution for the latent variable. Unlike the classical variational inference, where a factorized distribution is used to approximate the posterior, we employ a feedforward neural network supplemented by an encoder recurrent neural network to develop a more flexible probabilistic model. The approximate posterior distribution makes an inference on a trajectory to identify the effects of the unknown parameters. The time marching operator is approximated by a recurrent neural network, which takes a latent state sampled from the approximate posterior distribution as one of the input variables, to compute the time evolution of the probability distribution conditioned on the latent variable. In the numerical experiments, it is shown that the proposed variational inference model makes a more accurate simulation compared to the standard recurrent neural networks. It is found that the proposed deep learning model is capable of correctly identifying the dimensions of the random parameters and learning a representation of complex time series data.
△ Less
Submitted 26 February, 2021; v1 submitted 2 March, 2020;
originally announced March 2020.
-
Tight Static Lower Bounds for Non-Adaptive Data Structures
Authors:
Giuseppe Persiano,
Kevin Yeo
Abstract:
In this paper, we study the static cell probe complexity of non-adaptive data structures that maintain a subset of $n$ points from a universe consisting of $m=n^{1+Ω(1)}$ points. A data structure is defined to be non-adaptive when the memory locations that are chosen to be accessed during a query depend only on the query inputs and not on the contents of memory. We prove an…
▽ More
In this paper, we study the static cell probe complexity of non-adaptive data structures that maintain a subset of $n$ points from a universe consisting of $m=n^{1+Ω(1)}$ points. A data structure is defined to be non-adaptive when the memory locations that are chosen to be accessed during a query depend only on the query inputs and not on the contents of memory. We prove an $Ω(\log m / \log (sw/n\log m))$ static cell probe complexity lower bound for non-adaptive data structures that solve the fundamental dictionary problem where $s$ denotes the space of the data structure in the number of cells and $w$ is the cell size in bits. Our lower bounds hold for all word sizes including the bit probe model ($w = 1$) and are matched by the upper bounds of Boninger et al. [FSTTCS'17].
Our results imply a sharp dichotomy between dictionary data structures with one round of adaptive and at least two rounds of adaptivity. We show that $O(1)$, or $O(\log^{1-ε}(m))$, overhead dictionary constructions are only achievable with at least two rounds of adaptivity. In particular, we show that many $O(1)$ dictionary constructions with two rounds of adaptivity such as cuckoo hashing are optimal in terms of adaptivity. On the other hand, non-adaptive dictionaries must use significantly more overhead.
Finally, our results also imply static lower bounds for the non-adaptive predecessor problem. Our static lower bounds peak higher than the previous, best known lower bounds of $Ω(\log m / \log w)$ for the dynamic predecessor problem by Boninger et al. [FSTTCS'17] and Ramamoorthy and Rao [CCC'18] in the natural setting of linear space $s = Θ(n)$ where each point can fit in a single cell $w = Θ(\log m)$. Furthermore, our results are stronger as they apply to the static setting unlike the previous lower bounds that only applied in the dynamic setting.
△ Less
Submitted 17 April, 2024; v1 submitted 14 January, 2020;
originally announced January 2020.
-
Combined effects of amplitude, frequency and bandwidth on wavepackets in laminar turbulent transition
Authors:
Kean Lee Kang,
K. S. Yeo
Abstract:
This study concerns wavepackets in laminar turbulent transition in a Blasius boundary layer. While initial amplitude and frequency have well-recognized roles in the transition process, the current study on the combined effects of amplitude, frequency, and bandwidth on the propagation of wavepackets is believed to be new. Because of the complexity of the system, these joint variations in multiple p…
▽ More
This study concerns wavepackets in laminar turbulent transition in a Blasius boundary layer. While initial amplitude and frequency have well-recognized roles in the transition process, the current study on the combined effects of amplitude, frequency, and bandwidth on the propagation of wavepackets is believed to be new. Because of the complexity of the system, these joint variations in multiple parameters could give rise to effects not seen through the variation of any single parameter. Direct numerical simulations (DNS) are utilized in a full factorial (fully crossed) design to investigate both individual and joint effects of variation in the simulation parameters, with a special focus on three distinct variants of wavepacket transition {\textemdash} the reverse Craik triad formation sequence, concurrent N-type and K-type transition and abrupt shifts in dominant frequency. From our factorial study, we can summarize the key transition trends of wavepackets as follows:
1. Broad bandwidth wavepackets predominantly transit to turbulence via the N-route. This tendency remains strong even as the frequency width is reduced.
2. Narrow bandwidth wavetrains exhibit predominantly K-type transition. The front broadband part of an emerging wavetrain may experience N-type transition, but this wavefront should not be considered as a part of truly narrow-bandwidth wavepackets.
3. K-type transition is the most likely for wavepackets that are initiated with high energy/amplitude and/or with the peak frequency at the lower branch of the neutral stability curve.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
Statistical Modeling for Spatio-Temporal Data from Stochastic Convection-Diffusion Processes
Authors:
Xiao Liu,
Kyongmin Yeo,
Siyuan Lu
Abstract:
This paper proposes a physical-statistical modeling approach for spatio-temporal data arising from a class of stochastic convection-diffusion processes. Such processes are widely found in scientific and engineering applications where fundamental physics imposes critical constraints on how data can be modeled and how models should be interpreted. The idea of spectrum decomposition is employed to ap…
▽ More
This paper proposes a physical-statistical modeling approach for spatio-temporal data arising from a class of stochastic convection-diffusion processes. Such processes are widely found in scientific and engineering applications where fundamental physics imposes critical constraints on how data can be modeled and how models should be interpreted. The idea of spectrum decomposition is employed to approximate a physical spatio-temporal process by the linear combination of spatial basis functions and a multivariate random process of spectral coefficients. Unlike existing approaches assuming spatially- and temporally-invariant convection-diffusion, this paper considers a more general scenario with spatially-varying convection-diffusion and nonzero-mean source-sink. As a result, the temporal dynamics of spectral coefficients is coupled with each other, which can be interpreted as the non-linear energy redistribution across multiple scales from the perspective of physics. Because of the spatially-varying convection-diffusion, the space-time covariance is non-stationary in space. The theoretical results are integrated into a hierarchical dynamical spatio-temporal model. The connection is established between the proposed model and the existing models based on Integro-Difference Equations. Computational efficiency and scalability are also investigated to make the proposed approach practical. The advantages of the proposed methodology are demonstrated by numerical examples, a case study, and comprehensive comparison studies. Computer code is available on GitHub.
△ Less
Submitted 5 August, 2020; v1 submitted 23 October, 2019;
originally announced October 2019.
-
Readdressing the UV solar variability with SATIRE-S: non-LTE effects
Authors:
R. V. Tagirov,
A. I. Shapiro,
N. A. Krivova,
Y. C. Unruh,
K. L. Yeo,
S. K. Solanki
Abstract:
Context. Solar spectral irradiance (SSI) variability is one of the key inputs to models of the Earth's climate. Understanding solar irradiance fluctuations also helps to place the Sun among other stars in terms of their brightness variability patterns and to set detectability limits for terrestrial exo-planets.
Aims. One of the most successful and widely used models of solar irradiance variabili…
▽ More
Context. Solar spectral irradiance (SSI) variability is one of the key inputs to models of the Earth's climate. Understanding solar irradiance fluctuations also helps to place the Sun among other stars in terms of their brightness variability patterns and to set detectability limits for terrestrial exo-planets.
Aims. One of the most successful and widely used models of solar irradiance variability is SATIRE-S. It uses spectra of the magnetic features and surrounding quiet Sun computed with the ATLAS9 spectral synthesis code under the assumption of Local Thermodynamic Equilibrium (LTE). SATIRE-S has been at the forefront of solar variability modelling, but due to the limitations of the LTE approximation its output SSI has to be empirically corrected below 300 nm, which reduces the physical consistency of its results. This shortcoming is addressed in the present paper.
Methods. We replace the ATLAS9 spectra of all atmospheric components in SATIRE-S with the spectra calculated using the non-LTE Spectral Synthesis Code (NESSY). We also use Fontenla et al. (1999) temperature and density stratification models of the solar atmosphere to compute the spectrum of the quiet Sun and faculae.
Results. We compute non-LTE contrasts of spots and faculae and combine them with the SDO/HMI filling factors of the active regions to calculate the total and spectral solar irradiance variability during solar cycle 24.
Conclusions. The non-LTE contrasts result in total and spectral solar irradiance in good agreement with the empirically corrected output of the LTE version. This suggests that empirical correction introduced into SATIRE-S output is well judged and that the corrected total and spectral solar irradiance obtained from the SATIRE-S model in LTE is fully consistent with the results of non-LTE computations.
△ Less
Submitted 25 September, 2019;
originally announced September 2019.
-
Data-driven Reconstruction of Nonlinear Dynamics from Sparse Observation
Authors:
Kyongmin Yeo
Abstract:
We present a data-driven model to reconstruct nonlinear dynamics from a very sparse times series data, which relies on the strength of the echo state network (ESN) in learning nonlinear representation of data. With an assumption of the universal function approximation capability of ESN, it is shown that the reconstruction problem can be formulated as a fixed-point problem, in which the trajectory…
▽ More
We present a data-driven model to reconstruct nonlinear dynamics from a very sparse times series data, which relies on the strength of the echo state network (ESN) in learning nonlinear representation of data. With an assumption of the universal function approximation capability of ESN, it is shown that the reconstruction problem can be formulated as a fixed-point problem, in which the trajectory of the dynamical system is a fixed point of the ESN. An under-relaxed fixed-point iteration is proposed to reconstruct the nonlinear dynamics from a sparse observation. The proposed fixed-point ESN is tested against both univariate and multivariate chaotic dynamical systems by randomly removing up to 95% of the data. It is shown that the fixed-point ESN is able to reconstruct the complex dynamics from only 5 ~ 10% of the data. For a relatively simple non-chaotic dynamical system, the numerical experiments on a forced van der Pol oscillator show that it is possible to reconstruct the nonlinear dynamics from only 1~2% of the data.
△ Less
Submitted 10 June, 2019;
originally announced June 2019.
-
Recovering the unsigned photospheric magnetic field from Ca II K observations
Authors:
Theodosios Chatzistergos,
Ilaria Ermolli,
Sami K. Solanki,
Natalie A. Krivova,
Fabrizio Giorgi,
Kok Leng Yeo
Abstract:
We reassess the relationship between the photospheric magnetic field strength and the Ca II K intensity for a variety of surface features as a function of the position on the disc and the solar activity level. This relationship can be used to recover the unsigned photospheric magnetic field from images recorded in the core of Ca II K line. We have analysed 131 pairs of high-quality, full-disc, nea…
▽ More
We reassess the relationship between the photospheric magnetic field strength and the Ca II K intensity for a variety of surface features as a function of the position on the disc and the solar activity level. This relationship can be used to recover the unsigned photospheric magnetic field from images recorded in the core of Ca II K line. We have analysed 131 pairs of high-quality, full-disc, near-co-temporal observations from SDO/HMI and Rome/PSPT spanning half a solar cycle. To analytically describe the observationally-determined relation, we considered three different functions: a power law with an offset, a logarithmic function, and a power law function of the logarithm of the magnetic flux density. We used the obtained relations to reconstruct maps of the line-of-sight component of the unsigned magnetic field (unsigned magnetograms) from Ca II K observations, which were then compared to the original magnetograms. We find that both power-law functions represent the data well, while the logarithmic function is good only for quiet periods. We see no significant variation over the solar cycle or over the disc in the derived fit parameters, independently of the function used. We find that errors in the independent variable, usually not accounted for, introduce attenuation bias. To address this, we binned the data with respect to the magnetic field strength and Ca II K contrast separately and derived the relation for the bisector of the two binned curves. The reconstructed unsigned magnetograms show good agreement with the original ones. RMS differences are less than 90 G. The results were unaffected by the stray-light correction of the SDO/HMI and Rome/PSPT data. Our results imply that Ca~II~K observations, accurately processed and calibrated, can be used to reconstruct unsigned magnetograms by using the relations derived in our study.
△ Less
Submitted 9 May, 2019;
originally announced May 2019.
-
What Storage Access Privacy is Achievable with Small Overhead?
Authors:
Sarvar Patel,
Giuseppe Persiano,
Kevin Yeo
Abstract:
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives used to hide the access pattern to data whose storage has been outsourced to an untrusted server. Unfortunately, both primitives require considerable overhead compared to plaintext access. For large-scale storage infrastructure with highly frequent access requests, the degradation in response time and…
▽ More
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives used to hide the access pattern to data whose storage has been outsourced to an untrusted server. Unfortunately, both primitives require considerable overhead compared to plaintext access. For large-scale storage infrastructure with highly frequent access requests, the degradation in response time and the exorbitant increase in resource costs incurred by either ORAM or PIR prevent their usage. In an ideal scenario, a privacy-preserving storage protocols with small overhead would be implemented for these heavily trafficked storage systems to avoid negatively impacting either performance and/or costs. In this work, we study the problem of the best $\mathit{storage\ access\ privacy}$ that is achievable with only $\mathit{small\ overhead}$ over plaintext access.
To answer this question, we consider $\mathit{differential\ privacy\ access}$ which is a generalization of the $\mathit{oblivious\ access}$ security notion that are considered by ORAM and PIR. Quite surprisingly, we present strong evidence that constant overhead storage schemes may only be achieved with privacy budgets of $ε= Ω(\log n)$. We present asymptotically optimal constructions for differentially private variants of both ORAM and PIR with privacy budgets $ε= Θ(\log n)$ with only $O(1)$ overhead. In addition, we consider a more complex storage primitive called key-value storage in which data is indexed by keys from a large universe (as opposed to consecutive integers in ORAM and PIR). We present a differentially private key-value storage scheme with $ε= Θ(\log n)$ and $O(\log\log n)$ overhead. This construction uses a new oblivious, two-choice hashing scheme that may be of independent interest.
△ Less
Submitted 10 April, 2019;
originally announced April 2019.
-
Short note on the behavior of recurrent neural network for noisy dynamical system
Authors:
Kyongmin Yeo
Abstract:
The behavior of recurrent neural network for the data-driven simulation of noisy dynamical systems is studied by training a set of Long Short-Term Memory Networks (LSTM) on the Mackey-Glass time series with a wide range of noise level. It is found that, as the training noise becomes larger, LSTM learns to depend more on its autonomous dynamics than the noisy input data. As a result, LSTM trained o…
▽ More
The behavior of recurrent neural network for the data-driven simulation of noisy dynamical systems is studied by training a set of Long Short-Term Memory Networks (LSTM) on the Mackey-Glass time series with a wide range of noise level. It is found that, as the training noise becomes larger, LSTM learns to depend more on its autonomous dynamics than the noisy input data. As a result, LSTM trained on noisy data becomes less susceptible to the perturbation in the data, but has a longer relaxation timescale. On the other hand, when trained on noiseless data, LSTM becomes extremely sensitive to a small perturbation, but is able to adjusts to the changes in the input data.
△ Less
Submitted 5 April, 2019;
originally announced April 2019.